Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,795,261 papers from all fields of science
Search
Sign In
Create Free Account
Code integrity
Code integrity is a measurement used in software testing. It measures the how high is the source code's quality when it is passed on to the QA, and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
Software testing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Ensuring Software Integrity in IoT Devices
C. Echard
2017
Corpus ID: 55323687
This paper will review the available literature covering topics relevant to ensuring software integrity of the boot image and…
Expand
2016
2016
A HOLISTIC APPROACH TO QUALITY MANAGEMENT FOR COMPOSITE FORMING PROCESSES : PROCESS ASSESSMENT
F. Nezami
,
Diego Schierle
2016
Corpus ID: 36061101
The reduction of production costs and the realization of lightweight targets for composite forming parts can only be successfully…
Expand
2016
2016
Code Randomization: Haven’t We Solved This Problem Yet?
Stephen Crane
,
Andrei Homescu
,
Per Larsen
IEEE Cybersecurity Development
2016
Corpus ID: 16757491
Two decades since the idea of using software diversity for security was put forward, ASLR is the only technique to see widespread…
Expand
2015
2015
Hardware-Assisted Monitoring for Code Security in Embedded System
Xiang Wang
,
Quanneng Shen
,
+5 authors
Huihui Ji
IEEE 12th Intl Conf on Ubiquitous Intelligence…
2015
Corpus ID: 7066639
This paper presents a novel hardware-assisted monitoring architecture for code protection. Program code can be considered as a…
Expand
2014
2014
THE PREDICTIVE VALUE OF ULTRASONOGRAPHIC ASSESSMENT OF LOWER SEGMENT SCAR INTEGRITY IN PATIENT WITH PREVIOUS CAESAREAN SECTION NEAR TERM
A. Azeem
,
D. Ibrahim
,
Sheen Shazely
2014
Corpus ID: 54667498
Purpose: to determine the predictive value of trans-abdominal (TA) US in assessing thickness of lower uterine segment by…
Expand
2013
2013
Security, Trust and Privacy (STP) Model for Federated Identity and Access Management (FIAM) Systems
Zubair Ahmad Khattak
2013
Corpus ID: 201872702
The federated identity and access management systems facilitate the home domain organization users to access multiple resources…
Expand
Review
2012
Review
2012
A KNOWLEDGE BASED APPROACH FOR THE GENERALIZATION OF LINEAR FEATURES
Andriani Skopeliti
,
L. Tsoulos
2012
Corpus ID: 10509178
Andriani Skopeliti 1 Lysandros Tsoulos 2 Cartography Laboratory, Faculty of Rural and Surveying Engineering National Technical…
Expand
2007
2007
Credible News Measures: A Medium's Integrity.
Jendele Hungbo
2007
Corpus ID: 168045105
Introduction The growing need for development in all parts of the world has continued to throw up a great number of challenges in…
Expand
1987
1987
Source code security: checklist for managers
Jon Corelis
SGSC
1987
Corpus ID: 52869049
Although computer security is usually thought of as data security, the protection of the executable software which creates and…
Expand
1987
1987
Source code security: a checklist for managers
Jon Corelis
SIGU
1987
Corpus ID: 24797580
Although computer security is usually thought of as data security, the protection of the executable software which creates and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE